Search
Generic filters
Exact matches only

“The Conspirators” referenced in the DOJ Indictment of the GRU almost certainly included DNC Staffers, including Seth Rich

0 5 months ago

On July 24, 2017, I wrote The False Flag Murder of Seth Rich. Back then Trump/Russia was a dominant topic in the media. I looked at Seth’s death from the perspective that the Russian’s had hacked the DNC, that Julian Assange was lying, and that Russia was trying to frame Hillary Clinton in order to help Trump win the election. Things have changed a good bit since then. I’m going to look at it from the other side- that Julian Assange is telling the truth, that Seth Rich did provide emails to Wikileaks, and that Hillary Clinton was part of the reason he was killed.

I like to present relevant facts in a timeline format with enough context to understand the facts. This will be all relevant facts, even if they may seem contradictory at times. I’m going to largely skip the DOJ indictments, under the theory that these indictments are deliberately misleading, and use mainly other sources. And so I’ll do that in the next section, with a few opinions of my own added along the way. At the end, I’ll summarize what I think is likely to have happened.

Much of my research after July 2017 involved Jeffery Epstein and his network. Since then, I feel that I have come to understand much about the global network that attempts to control the world through blackmail and control of political institutions. Guccifer, before Guccifer 2.0, said he was fighting Illuminati. This gives me reason to believe that Guccifer 2.0 was concerned with larger issues than the the DNC per se.

1947. The Central Intelligence Agency was created in the National Security Act of 1947.

1953. The CIA began Project MK Ultra. This was a large clinical effort to know everything that was knowable about the human mind using some truly God-awful methods including torture, rape, incest, and Satanic rituals, according to a survivor of the program, Cathy O’Brien.

September 1995. Cathy O’Brien and Mark Phillips publish Trance: Formation of America, which I have never seen referenced in mainstream media. In this book you can find Cathy’s words on how she was raped by Presidents Reagan and Ford, Vice President Cheney, Canadian Prime Minister Pierre Trudeau, Senator Robert Byrd, Hillary Clinton, and others, and how her 3 year-old daughter was raped by President George Bush. Mark Phillips helped rescue Cathy from execution before her 30th birthday, which was a rule for all the sex slaves. Meanwhile, the media still pretends like it doesn’t know what’s going on with the likes of Jeffrey Epstein. The CIA psychiatrists used horrifying methods to shatter her mind, but she was able through therapy to put it back together and tell the story. She was part of a subset of MK Ultra called Project Monarch, which used children that were victims of multigenerational incest.

1997. Jerome Corsi, Prison Planet. “In 1997, (Nathaniel G.) Pearlman founded NGP Software Inc., a computer-oriented company organized to provide political software identifying Democratic voters.”

Nathaniel G. Pearlman of NGP VAN

1999. Corsi. “(Hillary) Clinton hired Pearlman and his then-fledgling NGP Software in her first 1999 Senate election campaign to clean up campaign data on donors that had contributed some $30 million.”

2008. Corsi. As chief technology officer for Clinton’s 2008 presidential campaign, (Nathaniel G.) Pearlman supervised the campaign’s Internet technology director, Bryan Pagliano.

Brian Pagliano

January 13, 2009. Washington Post: On Jan. 13, 2009, a longtime aide to Bill Clinton registered a private email domain for Hillary Clinton, clintonemail.com, that would allow her to send and receive email through the server.

March 2009. Corsi. “Bryan Pagliano installed Hillary’s private email server in the basement of the Clintons’ Chappaqua, NY home; Bill and Hillary Clinton personally paid Pagliano $5,000 for “computer services” prior to his becoming a State Department employee, according to a financial disclosure form Pagliano filed in April 2009.”

2010. Corsi. “In 2010, NGP (National Geographical and Political Software, supposedly not an acronym based on Pearlman’s initials), the voter data company created in 1997 by Pearlman in Washington, D.C., acquired with the Voice Activation Network, VAN, created by Mark Sullivan in 2001, to form NGP VAN.”

December 6, 2012. Washington Free Beacon: Anne Weismann, CREW’s general counsel, submitted a FOIA request to the State Department to “show the number of email accounts of or associated with Secretary Hillary Rodham Clinton.”

February 7, 2013. Marcel Lewis, the so-called original Guccifer, hacks into the AOL account of George Bush. One of the things he publishes is a photograph of Bill Clinton at George Bush’s home in Maine.

Note: There was a well-documented CIA drug trafficking operation in Arkansas in the 1980s while Bill Clinton was governor. This is very likely the reason that Don Henry, Kevin Ives and many others were murdered in Arkansas. If you buy into the “body bags” theories surrounding “Killary,” and Bill, you have to assume that George Bush’s CIA was involved.

March 2013. Fox News. Marcel Lazar, Guccifer, said “he first compromised Clinton confidant Sidney Blumenthal’s AOL account, in March 2013, and used that as a stepping stone to the Clinton server.”

March 15, 2013. The Smoking Gun reports on Guccifer’s hacking. “MARCH 15–The hacker who has spent the past several months breaking into the e-mail accounts of family, friends, and political allies of the Bush family has crossed party lines and illegally accessed the AOL account of a former senior White House adviser to President Bill Clinton.

March 16, 2013. Infowars publishes a letter from Tony Blair to George Bush declining an invitation to attend Bohemian Grove. I researched the rumors about Bohemian Grove, and found them to be largely true, and a shameful part of United States history. This letter was taken in a “hack” by Guccifer.

May 2013. Washington Post: “CREW received a response in May 2013: ‘no records responsive to your request were located.’” The Washington Free Beacon checked a log of FOIA requests and found that the CREW request was “CLOSED” as of November 2013.

May/June 2013. Edward Snowden downloads what were reported to be many of the NSA/CIA’s most sensitive programs onto a thumb drive from his position at the NSA in Hawaii, hops on a plane to Hong Kong, gives documents to media, then takes off to Russia where he is given asylum.

Note: I’m not judging what Snowden did as “good” or “bad” one way or the other. Just sayin’ the odds of him getting the most secret NSA/CIA programs onto a thumb drive then making it to Russia alive, without some coordination between intelligence services of both nations, are slim and none.

January 2014. Washington Post: Marcel Lazar, Guccifer is arrested in Romania.

June 2014. Wikileaks. “Seth Rich joins the DNC as the national data director. I don’t know what Wikileaks source is, but this link says Seth “was the Voter Expansion Data Director at the DNC. He had been with the organization since 2014.” Note that this certainly means that Seth was working with NGP VANs “VoteBuilder” software. Jerome Corsi also reported on PrisonPlanet that Seth was hired “in June 2014 as the DNC’s Voter Expansion Data Director, where his job was to adapt the “Voter Builder” component of VAN such that a prospective voter could print out a map of their nearest polling location.” Jerome also explained what NGP VAN was. NGP Software was founded by Nathaniel G. Pearlman in 1997.

December 5, 2014. Washington Post: “Clinton lawyers delivered 12 file boxes filled with printed paper containing more than 30,000 emails. Clinton withheld almost 32,000 emails deemed to be of a personal nature.”

March 10, 2015. At a United Nations event, Hillary Clinton gives a press conference where she discusses her emails.

Hillary Clinton: 4:21. We went through a thorough process to identify all of my work-related emails and deliver them to the State Department. At the end, I chose not to keep my private, personal emails. Emails about planning Chelsea’s wedding, or my mother’s funeral arrangements, condolence note to friends, as well as yoga routines, family vacations, the other things you typically find in in-boxes. No one wants their personal emails made public, and I think most people understand that and respect that privacy. 8:20. In going through the emails, there were over 60,000 in total sent and received. About half were work-related and went to the State Department, and about half were personal that were not in any way related to my work. I had no reason to save them, but that was my decision because the Federal guidelines are clear, and the State Department request was clear. For any government employee, it is that government employee’s responsibility to determine what’s personal and what’s work-related.

Note: I previously wrote that some of these “personal emails” likely involved Ghislaine Maxwell, and are in Ghislaine’s court documents that a judge has barred from release. Hillary spoke of “planning Chelsea’s wedding” and “family vacations.” Ghislaine attended Chelsea’s wedding. Chelsea vacationed with Ghislaine. Bill vacationed on Little St. James Island.

March 20, 2015. Pando publishes an article based on an interview with Marcel Lewis, Guccifer. Lewis claims that he chose the name Guccifer as a play on the word Lucifer. Lucifer means light, the same as the base word of “illuminati,” holder of the light. Lewis explains his motives to expose illuminati, (and uses some racist language).

Note: Much of what the public thinks about “Illuminati” is based on cinema and literature, such as a 2009 movie starring Tom Hanks, Angels and Demons.

There are those who have made an effort to factually chronicle the history of the Illuminati, however. The most well-known of these is an account from Myron Fagan in 1967. If you actually want to understand the methods of those who want to create a world government, I recommend that you start with that before you listen to Alex Jones. According to Fagan: “This Illuminati was organized by one Adam Weishaupt (in the 1760’s), born a Jew, who was converted to Catholicism and became a Catholic priest, and then, at the behest of the then newly organized House of Rothschild, defected and organized the Illuminati.” So this is the type of thing that the original Guccifer was created to fight, according to the man arrested for it. Russia has a long history battling this group, according to Fagan, where Czar Alexander rebuffed an effort to create a world government at the Congress of Vienna in 1815. For this, according to Fagan, the house of Rothschild (controlling Illuminati and other groups) swore revenge on the Czar’s family, and took it July 17, 1918, by executing the last Emperor of Russia, Nicholas II, his wife, and five children.

May 28, 2015. Lynn Forester de Rothschild writes an email to Cheryl Mills and Nick Merrill bemoaning what she describes as (A) an effort to undermine Hillary Clinton’s “reputation for honesty,” and (B), an “attack on wealth.” Wikileaks chose to tweet this email November 9, 2016, the day after the U.S. Presidential Election. It was part of the “#PodestaEmails,” according to the Wikileaks tweet. I did a timeline on public interactions between Lynn Forester de Rothschild, the Clintons, Donald Trump, Ghislaine Maxwell, Jeffrey Epstein, and Prince Andrew here.

September 2015. Wikileaks: 2015 September — “Josh Uretsky joins Bernie campaign as national data director, recommended by Seth Rich (according to Sanders in a Dec 2015 interview)”. I haven’t been able to find the interview Wikileaks is referring to where Bernie Sanders said that Seth Rich recommended Josh Uretsky.

September 2015. New York Times. “When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally, to the help desk. His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named ‘the Dukes,’ a cyberespionage team linked to the Russian government.”

October 2015. New York Times: “Special Agent Hawkins called repeatedly in October, leaving voice mail messages for Mr. Tamene, urging him to call back, ‘I did not return his calls, as I had nothing to report,”’Mr. Tamene explained in his memo.”

Note: Also according to the New York Times, “Ms. Wasserman Schultz, then the D.N.C.’s chairwoman, and Amy Dacey, then its chief executive, said in interviews that neither of them was notified about the early reports that the committee’s system had likely been compromised.” I find it hard to believe that the FBI was calling the DNC and saying that Russia was hacking them, and that Debbie Wasserman Schultz was not ever made aware. In any case, note that the “Russian hacking” began in September 2015, the same month that Josh Uretsky was hired.

December 16, 2015. From Bernie Sanders Press Releases: “As determined by CrowdStrike, the DNC’s cyber security firm, four staffers from Bernie Sander’s campaign accessed voter information from the Hillary Clinton campaign on December 16, 2015.”

December 18, 2015. The following are Statements by Debbie Wasserman-Schultz, Chair of the DNC, and Jeff Weaver, Bernie Sander’s campaign manager on a data breach in the DNC, from the Bernie Sander’s Press Releases.

Statement by DNC Chair on Sanders Data Breach

WASHINGTON – DNC Chair Rep. Debbie Wasserman Schultz issued the following statement today:

“Earlier this week, an incident briefly allowed users on the NGP VAN system to inadvertently access some data belonging to other campaigns. During this window, over the course of approximately 45 minutes, staffers of the Bernie Sanders campaign inappropriately accessed voter targeting data belonging to the Hillary Clinton campaign. At no point were financial information, donor records, or volunteer data exposed.

“We consider the security of the NGP VAN system and the integrity of the data it contains a top priority. The error in the VAN software was fixed immediately, and we have been reassured by NGP VAN that the incident did not expose any data to the public or any external entity. This is an isolated incident resulting from a vendor software patch, not a hack, and the users who accessed data were secure users. All VAN data is now secure.

Upon being made aware of the situation, the DNC immediately directed NGP VAN to conduct a thorough analysis to identify any users who may have accessed data inappropriately and pinpoint exactly what actions any such users took in the system, and to report these findings to the DNC. Further, the DNC has directed NGP VAN to begin a review process of their internal procedures to identify how this mistake was allowed to happen and prevent further such mistakes. In addition to this full and complete internal audit which we have instructed NGP VAN to conduct, we are also beginning the process of securing an independent audit by a data security firm of the company’s procedures.

“Once the DNC became aware that the Sanders campaign had inappropriately and systematically accessed Clinton campaign data, and in doing so violated the agreement that all the presidential campaigns have signed with the DNC, as the agreement provides, we directed NGP VAN to suspend the Sanders campaign’s access to the system until the DNC is provided with a full accounting of whether or not this information was used and the way in which it was disposed. I have personally reached out to Senator Sanders to make sure that he is aware of the situation. When we receive this report from the Sanders campaign, we will make a determination on re-enabling the campaign’s access to the system.

“We are working with the Sanders and Clinton campaigns and NGP VAN to establish all of the facts and move forward as quickly as possible. Our primary goal at this moment is to ensure the integrity of the data so that the campaigns — and the entire Democratic Party — can continue the important work we do of connecting with voters on the issues that matter most to them and their families.”

Statement by Jeff Weaver, Bernie Sanders 2016 Campaign Manager

Two months ago, shortly after our digital vendor who conducts modeling for our campaign told us that there was failure in the firewall that prevents campaigns from seeing one another’s data, we contacted the DNC and told them about the failure. We were concerned that our data could be compromised and we were assured at the time the firewall would be restored.

Instead, we found out two days ago that once again, this sensitive and important data was compromised because the DNC and its vendor failed to protect it.

We have invested enormous campaign resources in acquiring the rights to use this proprietary information. But the DNC, in an inappropriate overreaction, has denied us access to our own data.

Let me briefly discuss the three issues involved here.

First, this is not the first time that the vendor hired by the DNC to run the voter file program, NGP VAN, has allowed serious failures to occur. On more than one occasion, they have dropped the firewall between the data of competing Democratic campaigns. That is dangerous incompetence. It was our campaign months ago that alerted the DNC to the fact that campaign data was being made available to other campaigns. At that time our campaign did not run to the media, relying instead on assurances from the vendor that the problem would be resolved. Unfortunately, the other day, the vendor once again dropped the firewall between the campaigns for some data.

Secondly, after discussion with the DNC it became clear that some of our staffers irresponsibly accessed some of the data from another campaign. That behavior is unacceptable to the Sanders campaign and we fired the staffer immediately and made certain that any information obtained was not utilized. We are now speaking to other staffers who might have been involved and further disciplinary action . Clearly, while that information was made available to our campaign because of the incompetence of the vendor, it should not have been looked at. Period.

Thirdly, rather incredibly, the leadership of the DNC has used this incident to shut down our ability to access our own information, information which is the lifeblood of any campaign. This is the information about our supporters, our volunteers, the lists of people we intend to contact in Iowa, New Hampshire and elsewhere. This is information that we have worked hard to obtain. It is our information, not the DNCs.

In other words, by their action, the leadership of the Democratic National Committee is now actively attempting to undermine our campaign. This is unacceptable. Individual leaders of the DNC can support Hillary Clinton in any way they want, but they are not going to sabotage our campaign – one of the strongest grassroots campaigns in modern history.

We are announcing today that if the DNC continues to hold our data hostage, and continues to try to attack the heart and soul of our campaign, we will be in federal court this afternoon seeking an immediate injunction.

What is required here is a full and independent audit of the DNC’s handling of this data and its security from the beginning of this campaign to the present, including the incident in October that we alerted them to.

Note: FBI agent Adrian Hawkins called the DNC in September-October and said that Russia was hacking the DNC. Then we find out that DNC staffers are hacking the DNC in December. It raises the questions, who actually did the hacking in September-October 2015. If the DNC staffers did not hack the DNC in September-October, who did the hacking, and did that hacking play any role in their decision to hack in December. Josh Uretsky was fired by Bernie Sander’s campaign around this time, but spoke at some length in an interview on MSNBC on December 18 and made some allusions to hacking other than their own.

December 18, 2015. Josh Uretsky interview with MSNBC.

INTERVIEWER: Josh Uretsky, he was running the digital operation for the Bernie Sander’s campaign. He is the staffer who was fired by the Bernie Sander’s campaign over this. He did not, I am told, he was not able to hear that press conference we just played. Nonetheless, he is obviously at the center of this. He joins us now by phone. Josh, thank you for taking a few minutes and joining us. Let me start with this. Apparently, from what we’re told, and from the documents that NBC News has been able to obtain here, a lot of what went on here is very traceable, very trackable, and what we’re able to see from these documents is that people from your campaign for over 40 minutes were able to access, were able to look at, search, and make copies of Clinton supporters lists from her side of the wall. What is the justification for doing that?

Uretsky: I want to start off, first I was doing data, not digital, just to complete things there. So I guess what I want to say, we knew that what we were doing was trackable, and we were trying to create a clear record of a problem before reporting it, so we could make sure we weren’t crying wolf, and so that we understood the extent of the exposure of our data to any other political entities…

INTERVIEWER: “I’m sorry, are you saying you wanted to be able to prove to the DNC that you were able to access files from Hillary Clinton?

Uretsky: We had to assume that our data was equally exposed, and updated reports show that it was, and we wanted to document and understand the problem so that we could report it accurately.

INTERVIEWER: But I’m trying to figure out, when you say document the extent of the problem, does that mean you wanted to go through everything Hillary Clinton had, you wanted to see if she had anything you had?

Uretsky: No, what I mean is that we could see that there was a problem in security, and so we wanted to create a record on their system without taking any data for our own purposes.

INTERVIEWER: But if this is traceable and trackable, you were making copies of her voter list, weren’t you?

Uretsky: I guess you could phrase it that way, but we never, well those systems were all within the Votebuilder VAN system, the Votebuilder DNC system, it was all within their, their custodianship, if that makes any sense. So we didn’t, at least to my knowledge, we did not export any records of voter file data that were based on those forms (?). And so yes, we did establish proof that there was a problem so that “A” we understood what that problem was, and “B” we could accurately report that up the chain. And that did take us some time to figure out.

INTERVIEWER: But the problem besides the firewall being down, what are you able to establish by going into her voter… I think that’s the confusing part to people here. If you went into her voter files, if you searched them, if you copied information from them, it basically sounds like you’re telling me that you’re committing, I know crime is a strong word here, but you’re committing the misdeed to prove it’s possible to commit the misdeed.

Uretsky: Well no, because we didn’t actually like, use it for anything valuable, and we didn’t take custodianship of it. It’s like the equivalent of, I guess you know, the analogy would be, you know somebody leaves the front door open for the fifth time, and this was the first time that VAN made a mistake like this, but somebody leaves the front door open and you left a note inside the front door saying ‘you left the door open.’ And then maybe you went and checked the side door to, to make sure that door was closed.

INTERVIEWER: So are you, do you feel like, because our understanding again is, how traceable and trackable this is, you have been fired from the campaign for this, but I think there have been four others from the Sanders campaign at least who accessed this. None of them have been fired. Are they serving you up here?

Uretsky: No, look, I was in charge of the department and it’s my responsibility.

INTERVIEWER: But from what you’re describing to me, you’re basically saying you don’t feel you did anything wrong. Should you have been fired?

Uretsky: I think that, you know honestly, the system belongs to the DNC, and I did not believe at the time that I did it that they would think that what I did was wrong. Frankly, I did it knowing, full knowledge, that they could see what I was doing, and I did not do at any time something that I was going to try to hide from that. Knowing that they could see it, I did not expect them to react in the way that they did.

INTERVIEWER: And in this press conference, I understand that you didn’t see the press conference, but one thing that Jeff Weaver was making reference to, he said a suspicion in the campaign that Sander’s information had been made available because of a previous breach in this firewall, that information from the Sander’s campaign had become available to what he said was another campaign, presumably Hillary Clinton’s campaign, I guess maybe it could have been Martin O’Malley’s campaign. Is that something you can shed any light on, what specifically he’s alluding to there?

Uretsky: Yeah, without going too much into specifics, there was a previous time… it wasn’t actually in the VAN Votebuilder system, it was another system that was provided to us by the DNC where we discovered and assessed the problem and we reported that within about a day of having discovered it and trying to figure out exactly what it was, and make sure that it wasn’t something we were supposed to have.

INTERVIEWER: But did you, again, I’m trying to make sense of what Weaver was saying happened here, did your campaign establish, or think it established that Hillary Clinton’s campaign at any point got access to and reviewed your information.

Uretsky: We had to assume they had access to it. I did not conduct the audit, so I will rely on them to conduct an honest audit, and establish that they did not view or access or whatever adjectives or verbs they’re using to describe what happened. But I had to assume, like look we, thinking through how, look we know it was a bug in code that was switched out Wednesday morning. We had to assume that happened sometime between 8 and 9 AM. We found out about it about 10:30, so we had to assume that our data had been exposed all morning. So we had to know how exposed our data was, which to me was important. And that was my judgement call to find out how exposed our data was.

INTERVIEWER: All right, Josh Uretsky, formerly now with the Sander’s campaign, we appreciate you taking a few minutes. Thank you.

Note: Uretsky basically says that they deliberately hacking into Clinton’s campaign data to show that it could be done, and how it could be done. He further stated that Sander’s data had been compromised earlier, but on a different system than VAN VoteBuilder. This may or may not have been the Russians in September-October 2015.

December 20, 2015. NBC. Bernie Sander’s campaign suspends two more staffers over their breach of data.

March 19-22, 2016. John Podesta’s Gmail account is hacked. The Smoking Gun has a good read on it.

“On March 19, a Saturday, Podesta received an e-mail–purportedly from Google–warning him that, “Someone has your password.” The alert (seen above) informed Podesta that a sign-in attempt from an IP address in Ukraine was thwarted and that, “You should change your password immediately.” … After the e-mail arrived in Podesta’s account, it appears that his chief of staff, Sara Latham, sought guidance from an IT worker with the Clinton campaign. After examining the “Someone has your password” e-mail, staffer Charles Delavan (seen at left) mistakenly assured Latham and Shane Hable, the campaign’s chief information officer, that, “This is a legitimate email. John needs to change his password immediately, and ensure that two-factor authorization is turned on his account.” … Latham then forwarded Delavan’s email to Podesta and campaign staffer Milia Fisher, who had access to Podesta’s Gmail account. “The gmail one is real,” wrote Latham, who instructed Fisher to change Podesta’s password since “Don’t want to lock him out of his in box!” But instead of following the link provided by Delavan, it appears that Podesta or Fisher (pictured at right) clicked on the “CHANGE PASSWORD” box in the original “spear phishing” correspondence (a copy of which which was included in the e-mail chain that Saturday morning).

Note: It looks like the staffers deliberately clicked on this phishing email to reset Podesta’s password- deliberately, in order to make sure Podesta’s account was “hacked.” This email chain involved IT employees. Read it and judge for yourself. It is evidence that DNC staffers in addition to Seth Rich and Josh Uretsky wanted emails moved into public domain for some reason.

April 1, 2016. Department of Justice, Eastern District of Virginia: Marcel Lewis, Guccifer, is extradited to the United States from Romania and “made his initial appearance today here in federal court on charges relating to unauthorized access of protected computers.”

April 29, 2016. HomeFront Intel. On April 29, 2016, when the DNC became aware its servers had been penetrated, an emergency meeting was held between the Chairwoman of the DNC, Debbie Wasserman-Schultz, DNC’s Chief Executive, Amy Dacey, the DNC’s Technology Director, Andrew Brown, and Michael Sussman, a lawyer for Perkins Coie, a Washington, DC law firm that represented the DNC. Sussman took control of the meeting, setting out the DNC’s agenda when it came to dealing with the cyber attack on its server. The three most important questions, Sussman declared, were what data was accessed, how was it done, and how can it be stopped?

The one question Sussman, a former federal prosecutor who focused on computer crimes, did not ask was, who did it?

April 29, 2016. Bernie Sanders Press Releases. Michael Briggs:

BURLINGTON, Vt. – Four months ago, in an impulsive overreaction and at a critical point in the campaign just weeks before the closest Iowa caucus results in history, the DNC shut down the Sanders campaign’s access to its own voter file data, only restoring access after the campaign filed a lawsuit in Federal court.

Now, four months later, an independent investigation of the firewall failures in the DNC’s shared voter file database has definitively confirmed that the original claims by the DNC and the Clinton campaign were wholly inaccurate – the Sanders campaign never “stole” any voter file data; the Sanders campaign never “exported” any unauthorized voter file data; and the Sanders campaign certainly never had access to the Clinton campaign’s “strategic road map.” (Text continues for several paragraphs).

May 2016, The video below is from a Fox News jailhouse interview of Marcel Lewis about how he hacked into one of Hillary Clinton’s servers.

Herridge: “Lazar told Fox he accessed the account by correctly guessing Blumenthal’s security question. Then he sent content from the account to the media, and for the first time, publicly exposed the Clinton email address.” … “Once inside Blumenthal’s AOL account, Lazar said he gathered information about the Clinton server’s IP address, a unique numeric code like a phone number or home address.”

Herridge: “How many times did you access the Clinton server, Marcel?”

Lazar: “I say like twice. For me it was not like the Hillary Clinton server. It was like an email server she and others were using with political voting stuff.”

Herridge: “While Lazar’s claims cannot be independently verified, three computer specialists told Fox, the Clinton server now in FBI hands, may have an electronic trail that would confirm or disprove his claims.”

Herridge: “In the process of identifying the server’s vulnerabilities, Lazar said he came across evidence that others were there.”

Lazar: “There were up to 10 like IPs from other parts of the world. You see the numbers only but you can tell by the numbers the region of the world.”

May 25, 2016. Wikileaks. – Date of the last email in the DNC Email Archive released by Wikileaks [** KEY DATE]. Where was Seth Rich on this date? What was his state of mind? Did something happen on or about May 25, 2016 that resulted in Seth Rich losing access to high-level DNC emails? Or did he get one-time access to the DNC emails on May 25, 2016 and downloaded them all then? ←—— Investigation needed.

June 10, 2016- June 14 2016. HomeFront Intel. Over the course of two days, from June 10–12, CrowdStrike stealthily replaced the DNC’s software, moving carefully to avoid detection. With the DNC server clean and secure, the plan to “name and shame” Russia could go forward. The Post article, published on the morning of June 14, 2016, went viral, with nearly every major media outlet, including the New York Times, citing it in their own subsequent investigations. When CrowdStrike published its technical report 30 minutes later, it was received by a media already driven to a frenzy and starving for information. The report, “Bears in the Midst: Intrusion into the Democratic National Committee,” quickly became headline news, and Dmitri Alperovitch, its author, a household name. The DNC and CrowdStrike, it seemed, had executed the perfect attribution campaign, creating a perfect storm of political intrigue and spy-versus-spy narrative that the media couldn’t ignore.

June 15, 2016. Guccifer 2.0 is created. From the lawsuit filed against the DNC on June 28: On June 15, 2016, an individual using the name “Guccifer 2.0” established a publicly accessible website (https://guccifer2.wordpress.com) and posted a statement taking credit for the DNC server hack.8 Below the statement, Guccifer 2.0 posted a series of documents purportedly taken from the DNC’s servers including: (a) a 281-page confidential “Donald Trump Report” purportedly submitted to the DNC on 12/19/15 and containing extensive research on the presumptive Republican presidential nominee; (b) Excel spreadsheets containing the names and personal information of donors to the Democratic Party and Hillary Clinton’s campaign; and (c) a 59-page memorandum marked “Secret” setting forth national security and foreign policy “promises and proposals” and purportedly obtained from Clinton’s personal computer.

June 21, 2016. Vice interviews someone claiming to be Guccifer 2.0. He says he is Romanian. Guccifer says he is following in the footsteps of the original Guccifer, Marcel Lazar, also a Romanian. Vice tries to trip Guccifer 2.0 up by speaking to him in Romanian. In regards to DNC hacking, Guccifer 2.0 said “I used 0-day exploit of NGP VAN soft then I installed shell-code into the DNC server. it allowed me to intrude into DNC network. They have Windows-based domain architecture. then I installed my Trojans on several PCs. I had to go from one PC to another every week so CrowdStrike couldn’t catch me for a long time. I know that they have cool intrusion detection system. But my heuristic algorithms are better.” Vice asked if he noticed anyone else in the system, and Guccifer 2.0 did not answer.

June 22, 2016. Brian Pagliano is deposed. He reportedly set up Hillary Clinton’s private email server. He takes the 5th on questions related to this. Screenshot is from a transcript of Pagliano’s deposition published by Judicial Watch.

June 28, 2016. Attorneys Jared Beck, Elizabeth Beck, Cullin O’Brien, and Antonino Hernandez file a class action complaint against the DNC and Debbie Wasserman-Schultz. The lawsuit states in part:

Despite the requirements in the Charter, and in spite of the multiple public declarations of neutrality and impartiality with respect to the Democratic primary process, the DNC was not neutral. To the contrary, the DNC was biased in favor of one candidate – Hillary Clinton (“Clinton”) – from the beginning and throughout the process. The DNC devoted its considerable resources to supporting Clinton above any of the other Democratic candidates. Through its public claims to being neutral and impartial, the DNC actively concealed its bias from its own donors as well as donors to the campaigns of Clinton’s rivals, including Bernie Sanders (“Sanders”).

According to this lawsuit, Guccifer 2.0 provided a document critical to proving that the DNC favored Hillary Clinton over all candidates document was released June 15, 2016.

Among the documents released by Guccifer 2.0 on June 15th is a two-page Microsoft Word file with a “Confidential” watermark that appears to be a memorandum written to the Democratic National Committee regarding “2016 GOP presidential candidates” and dated May 26, 2015. The DNC Memo presents, “a suggested strategy for positioning and public messaging around the 2016 Republican presidential field.” It states that, “Our goals in the coming months will be to frame the Republican field and the eventual nominee early and to provide a contrast between the GOP field and HRC. 11” (emphasis added). The DNC Memo also advises that the DNC, “[u]se specific hits to muddy the waters around ethics, transparency and campaign finance attacks on HRC.” In order to “muddy the waters” around Clinton’s perceived vulnerabilities, the DNC Memo suggests “several different methods” of attack including: (a) “[w]orking through the DNC” to “utilize reporters” and create stories in the media “with no fingerprints”; (b) “prep[ping]” reporters for interviews with GOP candidates and having off-the-record conversations with them; (c) making use of social media attacks; and (d) using the DNC to “insert our messaging” into Republican-favorable press. … Despite there being every indication that the 2016 Democratic primary would be contested by multiple candidates, including Sanders, the DNC Memo makes no mention of any Democratic candidate except Clinton, and builds the DNC’s election strategy on the assumption that Clinton will be the nominee, with no doubts attached. Rather than reflecting an “impartial” or “evenhanded” approach to the nominating process, as required by the Charter, the DNC Memo strongly indicates that the DNC’s entire approach to the process was guided by the singular goal of elevating Clinton to the general election contest.

July 1, 2016. Shawn Lucas serves the above lawsuit to Rebecca Harries at the DNC.

July 5, 2016. Computer Weekly: “Using a combination of copying and compression techniques, the ‘last modified’ timestamps of all but 12 of the aged files was changed to 5 July 2016, just five days before Rich was killed and 17 days before WikiLeaks published its first share of the DNC hacks.” … “One document – a tip-off file obtained in June 2017 by Leonard’s site from an “anonymous source” – took new disinformation all the way to the White House and the CIA. … The untitled file included complex details explaining how to unlock information inside a tranche of files released by Guccifer 2.0 in London. Metadata in the files had been manipulated to “prove” that the documents could have been stolen by a Democratic National Committee (DNC) employee. Until the file arrived, the information hidden in the files, created by the GRU hackers and known only to them, had not been detected by security experts.”

Note: I’m not sure what this fact means, but the July 5, 2016 date is obviously very important. It could be that Seth compressed data on this date to move himself, or that someone made it look that way. The narrative of the article is that the Russians actually did the hacking, and that Tim Leonard was mistaken in believing that Guccifer 2.0 was designed to cover the Russian tracks. I take facts no matter the narrative and reorganize them to make my own conclusions.

July 5, 2016. James Comey addresses Congress and announces that no criminal charges will be filed against Hillary Clinton. His most quoted sentence: “Although we did not find clear evidence that Secretary Clinton or her colleagues intended to violate laws governing the handling of classified information, there is evidence that they were extremely careless in their handling of very sensitive, highly classified information.”

July 6, 2016. Daily Mail: Joel Rich “revealed to Daily Mail Online that four days before his death, Seth learned he had been chosen to work on Hillary Clinton’s presidential campaign.”

July 7, 2016. Fox News: “FBI Director James Comey said in a House hearing this afternoon that a notorious Romanian hacker lied about accessing Hillary Clinton’s emails.”

Rep. Blake Farenthold (R-TX): “He (Guccifer) claimed he gained access to Sid Blumenthal’s email account and traced it back to Clinton’s private server. Can you confirm that Guccifer never gained access to her server.”

Comey: “Yeah, he did not. He admitted that was a lie.”

Note: Recall that Lazar said in the May, 2016 Fox News interview being referred to here that “For me it was not like the Hillary Clinton server. It was like an email server she and others were using with political voting stuff.” So Lazar did not claim that he hacked into [email protected] in his Fox News interview. This also raises the question, what did Lazar look at that contained “political voting stuff.” That could be the DNC. Lazar was interviewed by the FBI on June 7, 2016, according to Politico. I cannot find a FBI report of the interview of Lazar, but Politico quoted “Lazar began by stating that he had never claimed to hack the Clinton server. [An FBI agent] then advised that Fox News had recently published an article which reported that Lazar had claimed to hack the Clinton server.Lazar then stated that he recalled the interview with Fox News, and that he had lied to them about hacking the Clinton server.” Again, you can hear Lazar’s actual speech in the interview where he said “it was not like the Hillary Clinton server,” so that raises the question why the FBI report would be worded in this manner.

I clicked on a link in the Politico article to the “The 189 pages the bureau released includes interviews with some of Clinton’s closest aides, such as Huma Abedin and Cheryl Mills; senior State Department officials; and even Marcel Lazar, better known as the Romanian hacker “Guccifer.” Here’s what you get when you click on 189 pages. It calls up “Vault Home – Hillary R. Clinton.” “This page does not seem to exist…” It might be humorous if we weren’t talking about murder and national security.

July 7, 2016. From a summary of a supposed SVR report, transcribed into English by Sorcha Faal.

According to this report, SVR “electronic specialists” performing counter intelligence “missions/operations” noted on 7 July an “enormous/gigantic” increase of computer and telephonic traffic between the Democratic National Committee (DNC) headquarters in Washington D.C. and the Clinton Foundation (CF) offices in New York City.

Upon a “deeper/broader” investigation into this “odd/strange” increase in communications between these believed to be separate organizations, this report continues, SVR analysts determined that the original initiating person responsible was a 27-year-old DNC official named Seth Rich who was that political organizations Deputy Director Data for Voter Protection/Expansion who had helped develop a computer program for the Democratic National Committee allowing people to type in their address and get a map to their polling place.

What had drawn the concern of DNC official Seth Rich causing him to contact the Clinton Foundation, this report explains, was his discovery of a “pay-to-play” scheme that involved people seeking jobs with a new Hillary Clinton presidential administration to funnel money to the Clinton’s through their foundation with various US federal government positions being designated by the dollar amount it would cost to buy them.

As the “cash for favors” lifestyle of both former President Bill Clinton and Hillary Clinton have long been known about, this report continues, SVR analysts, while preparing to document the results of their 7 July probe into the Clinton Foundation concerns of DNC official Seth Rich, became alarmed when they discovered that his “micro computer system” (cell phone?) had become “infected/virused” by “killers/assassins” working for the Clinton’s—and who the SVR had previously documented as being involved in the assassination of the husband of the State of Georgia prosecutor investigating Bill Clinton for child sex crimes and the murder of American pop singer Christina Grimmie and massacre of nearly 50 gay pride celebrants.

Fearing that the life of DNC official Seth Rich was in danger due to his being “tracked/targeted” by this known Clinton “hit team”, this report says, SVR Director Mikhail Fradkov authorized an emergency contact between his agency and the US State Department—but, and shockingly, when Russian diplomats presented the SVR findings to US authorities, on 7 July, they were immediately expelled from the United States. Causing even greater perplexity to the SVR about these events, this report continues, was that in expelling these Russian diplomats from the United States, the US State Department thanked Russia for the information stating that it would be “taken care of”, and then formally requested that the matter remain secret.

However, less than 24 hour later, this report notes, the Washington Post wrote a “made up story” about what had actually happened causing Deputy Foreign Minister Sergey Ryabkov to publically state: “I can confirm that […] the US government did demand the departure of two employees of the Russian Embassy in Washington DC without presenting any complaints to the employees themselves. Furthermore, the State Department strongly asked us not to make this fact public. As you can see, it is customary for American diplomats to keep their word.”

Note: I mean, there’s a lot going on here in a few days. Seth was offered a job by Hillary (according to his father), you had a huge spike in traffic between the DNC and the Clinton Foundation (according to an unconfirmed SVR report), and data later given to Wilileaks was compressed all around the same time before the SVR reportedly said it warned the State Department about danger to Seth Rich’s life. Wow. And the MPD motive is a botched robbery.

July 10, 2016. Seth Rich is dead.

July 13, 2016. Michael Isikoff, Yahoo News. On this day, according to US Attorney Deborah Sines, Russia’s foreign intelligence service, SVR, said through an outlet that they controlled that Seth Rich was on his way to the FBI to report corruption related to Hillary Clinton’s campaign. (I quoted much of what I believe the supposed SVR report that Deborah Sines was referring to in the July 7, 2016 block).

July 22, 2016. Twitter. Wikileaks publishes 20,000 emails from the DNC.

July 27, 2016. (Approximately). The United States government receives a report from a “friendly foreign government” (England) that regarded “Papadopoulos and his statement that the Russian government could assist the Trump Campaign,” This is according to the “Mueller Report,” which said the FFG report was “within a week of the (July 22) release.” I use July 27, 2016, because

Late July, 2016. From the “Steele Dossier.” Steele dated this memo July 30, 2016.

Speaking in confidence to a trusted associate in late July 2016, a Russian emigre figure close to the Republican US presidential candidate Donald campaign team commented on the fallout from publicity surrounding the Democratic National Committee (DNC) e-mail hacking scandal. The emigre said there was a high level of anxiety within the TRUMP team as a result of various accusations levelled against them and indications from the Kremlin that President PUTIN and others in the leadership thought things had gone too far now and risked spiralling out of control.

Continuing on this theme, the emigre associate of TRUMP opined that the Kremlin wanted the situation to calm but for ‘plausible deniability’ to be maintained concerning its (extensive) pro-TRUMP and anti-CLINTON operations. S/he therefore judged that it was unlikely these would be ratcheted up, at least for the time being.

July 31, 2016. Breitbart. William Binney states the obvious, that the NSA, of course, has all of Hillary Clinton’s “missing” emails. Binney: “So if the FBI really wanted them they can go into that database and get them right now.”

July 31, 2016. “Crossfire Hurricane,” the investigation into coordination between the Trump campaign and Russia, begins.

August 1, 2016. Omaha World-Herald. Hillary Clinton meets privately with the parents of Seth Rich. “I figured it would be just a staged greeting,” said his father, Joel Rich. “But my wife and I were both really caught off guard. Secretary Clinton had talked with people who knew Seth — and it wasn’t just that he had worked at the DNC and was a nice guy.”

August 2, 2016. Shawn Lucas is dead. Exit 9 Investigations has a heartbreaking read on it here. He was obviously murdered. They made it look like an overdose of fentanyl, which he did not use, according to his girlfriend, Savannah King. The police conducted only a cursory investigation. “Nobody answered a single question I asked and instead, ignored my existence. Another thing I find sketchy is how the detective never questioned me about anything except for the exact time I found him. He didn’t bother asking neighbors either. Shawn was far from a drug user, in fact, he despised drugs considering the number of friends he’s lost. He was a healthy man, with zero health issues.” In Part III of the Exit 9 series on Shawn Lucas, Savannah said ““The police state that his death was all due to an accidental overdose. They deemed it unrelated to any political retaliation. In fact, laughed in my face when I brought that up to them. Given Seth Rich, who got shot minutes away from our neighborhood just days prior. My gut tells me they know something and aren’t telling the public, keeping dirty secrets that they know would get the public fuming.

August 5, 2016. Roger Stone publishes an op-ed on Breitbart where he says that Guccifer 2.0 hacked the DNC, not Russia. Stone later tweets with Guccifer 2.0, and exchanged direct messages, which he later published.

August 9, 2016. Twitter. “WikiLeaks has decided to issue a US $20k reward for information leading to conviction for the murder of DNC staffer Seth Rich.” Link to emails here.

August 9, 2016. Julian Assange gave an interview to Nieuwsuur that included an implication that Seth Rich was a source for Wikileaks. Assange: “Our whistleblowers go to significant efforts to get us material and often very significant risks. There’s a 27 year-old that works for the DNC, was shot in the back, murdered, just a few weeks ago for unknown reasons as he was walking down the street in Washington.

August 10, 2016. Seth Rich was the subject of a conversation in the FBI between Peter Strzok and Lisa Page, among others. This conversation was “squashed.” The conversation was partially redacted by the FBI before it was released to Judicial Watch. Obviously, the timeline suggests that after Wikileaks offered the reward, the FBI investigated Seth Rich’s role in the Wikileaks release, and Peter Strzok classified the conversation regarding him.

August 17, 2016. Yahoo News: Chuck Johnson, who set up the meeting between Dana Rohrabacher and Julian Assange, refuses to cooperate with a Senate Intelligence Community investigation.

August 22, 2016. Washington Post: “The FBI’s year-long investigation of Hillary Clinton’s private email server uncovered 14,900 emails and documents from her time as secretary of state that had not been disclosed by her attorney”

August 25, 2016. Robbin Young, Twitter. Guccifer 2.0 tells Robbin Young that Seth Rich was his source.

September 2016. DailyMail: Murray said he retrieved the package from a source during a clandestine meeting in a wooded area near American University, in northwest D.C. He said the individual he met with was not the original person who obtained the information, but an intermediary.

Not to say that Donna Brazile had anything to do with Seth Rich’s murder, or was Craig Murray’s source (if that happened), but it’s noteworthy that Donna Brazile accepted the “Wonk of the Year” award from American University in March, 2016.

And it’s noteworthy that Brazile wrote in her book, “Hacks,” that she feared for her life after the death of Seth Rich. Brazile passed a debate question to Hillary Clinton in March. She reportedly was at the hospital the night Seth died, but that could easily be explained by concern on her part. In any case, she appears to be a facts witness that the MPD did not interview.

September 1, 2016. Russia Today: Hacker Marcel Lazar, or the first “Guccifer,” “was sentenced to 52 months by a US federal judge in Virginia. The near-maximum sentence under US law is meant as a deterrent to future hackers, the judge said.” … “This epidemic must stop,” said US District Judge James Cacheris on Thursday as he meted out a 52-month sentence to Lehel in his Alexandria, Virginia courthouse. A tough penalty would deter future hackers, the judge said. The sentence is just shy of the 54-month maximum penalty under US sentencing guidelines, which the federal prosecutors requested in the case. … “Though “Guccifer” claimed to have accessed former Secretary of State Hillary Clinton’s private email server, there was no evidence to show he actually did so. He did, however, expose the server’s existence by compromising the email accounts of Clinton confidant Sidney Blumenthal and posting several of his emails to Clinton in 2013.”

September 13, 2016. Tim Holmes read a statement from Guccifer 2.0 at a cybersecurity conference in London. Forbes obtained a transcript and published it, which I’ll republish below. Guccifer says that they exploited vulnerabilities in the DNC’s NGP VAN system. Guccifer defends Josh Uretsky. Most of the content is devoted to how companies gather data on people in the “cloud.” It doesn’t read like it was written by Russians trying to influence a Presidential election.

Hello everyone. This is Guccifer 2.0. I’m sure you know me because my name is in the conference program list. As I see it, this is the place to discuss cyber security and cyber threats. And may be to propose some solutions.

Let’s figure out who poses the real threat to begin with. Cyber security firms are quick to blame hackers for their activity. Yeah, they cause a lot of troubles for business and politics.

But, who poses a real cyber threat? What do you think? Is it Guccifer? Or Snowden? Or Assange? Or Lazar?

No.

It seems obvious. It’s plain as day you would say. But still my answer is no.

Large IT companies pose a real cyber threat nowadays. You may perfectly know some of them or may not. But their responsibility for the future of our world is growing from day to day. And I will explain to you why.

So. What’s wrong with large IT companies?

First. On their way to a global progress and big money they are collecting users’ personal data, which is the same as spying on people, because many of us don’t even realise they track us online and collect our info. Companies store these data making it vulnerable for leaks.

Second. They create conditions that make people store their info in cloud services. It seems convenient but it’s extremely vulnerable because it’s thousand times easier to steal the data from the cloud than from a personal cell phone for instance.

The next reason, and the crucial one, is software vulnerability. Tech companies hurry to finish the work and earn money. So they break development cycle very often omitting the stage of testing. As a result, clients have raw products installed on their systems and networks with a great number of bugs and holes.

Fourth. It’s well known that all large companies look forward to receiving governmental contracts. They develop governmental websites, communication systems, electronic voting systems, and so on and have their products installed to critical infrastructure objects on the national level.

They are aggressively lobbying their interests. You can see it at the diagram that they spent millions of dollars for lobbying. That doesn’t mean they will produce better software. That means they will get even more money in return.

Fifth. This is censorship. For example Twitter censors unwelcome users. I can judge it by myself here. You can see how Guccifer 2 hashtag unnaturally abruptly stops trending. It seems impossible that all Twitter users just stop twitting about Guccifer 2 leaks, in a moment. That’s why people started Guccifer 3, 4, 5 hashtags to avoid censorship. People also told me their twits were not shown in the Twitter live wall unlike to their account’s wall.

So, the cyber aggressiveness is progressing nowadays. The number of cyber attacks is steadily growing. What’s the reason? What’s wrong with the cyber defense?

Well. they take wrong measures. They search for cyber criminals, sentence them. But two more hackers appear instead of one convicted. The real problem is inside. This is just the same as in offline world. This is not enough to prosecute criminals. It requires preventive measures, to fight criminality by elimination of the possibility of crime.

So, what’s the right question we should ask about cyber crime?

Who hacked a system?

Wrong. The right question is: who made it possible that a system was hacked? In this regard, what question should you ask me?

How I hacked the DNC???

Now you know this is a wrong question. Who made it possible, that I hacked into the DNC? This is the question. And I suppose, you already know the answer. This is NGP VAN Company that operates the DNC network. And this is its CEO Stu Trevelyan who is really responsible for the breach.

Their software is full of holes. And you knew about it even before I came on stage.

You may remember Josh Uretsky, the national data director for Sander’s presidential campaign. He was fired in December, 2015 after improperly accessing proprietary data in the DNC system. As it was agreed, he was intentionally searching for voter information belonging to other campaigns.

However, he is not to blame. The real reason voter information became available for non-authorized users was NGP VAN’s raw software which had holes and errors in the code. And this is the same reason I managed to get access to the DNC network. Vulnerabilities in the NGP VAN software installed on its server which they have plenty of. Shit! Yeah?

This scheme shows how NGP VAN is incorporated in the DNC infrastructure. It’s for detailed examination, if you are interested. And here are a couple of NGP VAN’s documents from their network. If you r interested in their internal documents, you can have them via the link on the screen. The password is usual. It’s also on the screen. You may also ask the conference producers for them later.

So, as you see there’s no need to breach into separate users accounts or separate systems. You just need to hack their tech company. This is the feature.

Big IT companies lead us to a disaster. In their pursuit for money they release raw software, so their clients are highly vulnerable. It became usual to blame everything on hackers while IT companies just pretend they are working hard to patch bugs and to plug holes. And they even ask for more and more money to correct their own mistakes.

As a result they pose a threat to the critical infrastructure elements and the national security as a whole. Total computerization along with inadequate software development may cause a lot of troubles. That’s why it’s better to use paper sometimes.

We should start now to prevent electronic apocalypse and rise of the machines in the future. Or else it would be too late. As the financial corporations are ruling the world now so the IT companies will rule it in the near future.

What should we do?

You would tell me I could report a bug to the company as it’s commonly done. What do you think they would answer me? Thanks? Or this is not crucial? Or maybe they would even give me some money. Yeah. But what could it change?

Nothing. Yeah. Really. Nothing at all.

We need to shake the situation, to make our voices sound. Yeah, I know if they find me I’m doomed to live like Assange, Snowden, Manning or Lazar. In exile or in prison.

But it’s worth it for they are the heroes, heroes of new era.

Thanks for ur attention

Note: This doesn’t read like pro-Trump, or anti-Hillary, or anything political, really. It reads like someone concerned about how the data of American citizens is transferred to international organizations. And I’d note, further, that America’s Total Information Awareness program moved into private hands like Google and Facebook after Congress defunded it in 2003, who can sell it or transfer it to anyone in the world. Privacy of data, all your internet history, all your financial information, even your location history and friends, is gone completely. You can be micro-targeted by sophisticated means, targeted ads and media content especially, based on your psychological profile. NGP VAN was a democratic micro-targeting response to the GOPs use of it by Karl Rove. Of course that presentation can be faked by someone trying to make it look like it came from concerned DNC hackers instead of Russians.

September 23, 2016. The Chicago Tribune. Jason Chaffetz said that Cheryl Mills, John Bentel, and Heather Samuelson were granted immunity for cooperating with an investigation into Hillary Clinton’s use of her private email server. “It had previously been reported immunity had been granted to Bryan Pagliano, a tech expert who set up Clinton’s email server, as well as Paul Combetta, a computer specialist for a private firm that later maintained Clinton’s email setup.”

September 30, 2016. Patribotics. “In turn, this proves Wikileaks gained Russian hosting on September 30th 2016, one week before the Podesta emails were made public. Wikileaks got Russian Federation virtual addresses one week before the Podesta emails. Let that sink in.” (Emphasis theirs).

October 7, 2016. Twitter. Wikileaks publishes the first of Podesta’s emails.

November 5, 2016. Gateway Pundit. “On November 9, 2016 Ellen Ratner admitted publicly that she met with Julian Assange for three hours the Saturday before the 2016 election. According to Ratner, Julian Assange told her the leaks were not from the Russians, they were from an internal source from the Hillary Campaign.”

December 12, 2016. Consortium News. VIPS, Veteran Intelligence Professionals for Sanity, as they call themselves, dispute the Russian hacking narrative in the press, specifically a New York Times report, that Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump.” VIPS is comprised of:

William Binney, former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

Larry Johnson, former CIA Intelligence Officer & former State Department Counter-Terrorism Official

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst (ret.)

Elizabeth Murray, Deputy National Intelligence Officer for Middle East, CIA (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA (ret.)

In short, they “conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.”

January 10, 2017. The Hill. James Comey told the Senate Intelligence Committee that the DNC denied access to their servers to the FBI. Instead the FBI would get their information from CrowdStrike, the DNC cyber security firm.

February 2, 2017. Politico: The Sergeant at Arms announced that 5 people were “under criminal investigation amid allegations that they stole equipment from more than 20 member offices and accessed House IT systems without lawmakers’ knowledge.” This was reported later to involve Imran Awan and the DCCC.

March 7, 2017. Wikileaks tweets about the CIA’s techniques of copying the various styles of hacking groups, in order to use the same style in the future and make it look like another group did it.

April 6, 2017. Daily Caller. A laptop that Rep. Debbie Wasserman Schultz has frantically fought to keep prosecutors from examining may have been planted for police to find by her since-indicted staffer, Imran Awan, along with a letter to the U.S. Attorney.  U.S. Capitol Police found the laptop after midnight April 6, 2017, in a tiny room that formerly served as a phone booth in the Rayburn House Office Building, according to a Capitol Police report reviewed by The Daily Caller News Foundation’s Investigative Group. Alongside the laptop were a Pakistani ID card, copies of Awan’s driver’s license and congressional ID badge, and letters to the U.S. attorney. Police also found notes in a composition notebook marked “attorney-client privilege.”  The laptop had the username “RepDWS,” even though the Florida Democrat and former Democratic National Committee chairman previously said it was Awan’s computer and that she had never even seen it.  Awan was banned Feb. 2, 2017, from the congressional computer network because he is a suspect in a cybersecurity investigation, but he still had access to House facilities because Wasserman Schultz continued to employ him.

May 21, 2017. An anonymous post appears on the internet from someone claiming to be a resident at the ER of the hospital on July 10, 2016, that Seth Rich was not in any danger of dying from his wounds. I published a text here. I titled it “Seth Rich appears to have been killed at the hospital.” Appears is a good word.

May 24, 2017. Daily Caller. Debbie Wasserman-Schultz wants the laptop back. She told US Capitol Police Chief Matthew R. Verderosa, “DWS: I think you’re violating the rules when you conduct your business that way and you should expect that there will be consequences.”

Note: I’m not going to bother speculating about how or if this laptop is related to Seth Rich and/or the DNC hacks, other than to say that there is a large effort by some unknown party or parties to bring hidden information into public view, whether coordinated or not. We still don’t know what is on this laptop or how it got there, but it was obviously meant for law enforcement to find.

May 29, 2017. Tim Leonard, using the alias Adam Carter, publishes an article claiming that Guccifer 2.0 was operation to plant fake Russian fingerprints in DNC hacking.

June 13, 2017. Attorneys Jared and Elizabeth Beck of the DNC Fraud lawsuit publicly announced today via Facebook live stream that they had filed a motion to the court seeking an order of protection. Jared Beck spoke, explaining that the decision was based in part on the unusual deaths of Shawn Lucas, Beranton Whisenant, and Seth Rich, as well as threats and bizarre phone calls the plaintiffs and counsel had received.

July 24, 2017. VIPS publishes a memo which gives a more detailed account of why they believe the Russian hacking narrative is false. “Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack.” They note: “There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server.” … July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is much faster than what is physically possible with a hack. … It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device.

August 12, 2017. There are communications between Emma Best and Wikileaks concerning Guccifer 2.0. According to an April 5, 2018 article by Kevin Collier of Buzzfeed, Emma Best ‘was also negotiating with Guccifer 2.0 for access to what it had teased on its blog as ‘exclusive access’ to hacked Democratic Congressional Campaign Committee files.” Wikileaks basically asked Emma Best to stay out of releasing any material from Guccifer 2.0, and let Wikileaks be the one to do so.

“[P]lease ‘leave,’ their conversation with them and us,” WikiLeaks asked journalist Emma Best, who was also negotiating with Guccifer 2.0 for access to what it had teased on its blog as “exclusive access” to hacked Democratic Congressional Campaign Committee files. “[W]e would appreciate it if you did not dump the docs and obviously archive.org will delete them anyway.”

WikiLeaks’s pitch worked. “I dropped the matter with both parties and never received or passed on any exclusive G2, DNC, Podesta, etc. documents,” Best said. Less than an hour after WikiLeaks’s last message to Best, Guccifer 2.0 tweeted that it had handed those documents over.

August 23, 2017. Daily Caller. She (Debbie Wasserman Schultz) changed her story two months later, claiming it was Awan’s laptop — bought with taxpayer funds from her office — and she had never seen it. She said she only sought to protect Awan’s rights. “This was not my laptop,” she said August 3. “I have never seen that laptop. I don’t know what’s on the laptop.”

August 25, 2017. A judge dismisses the lawsuit against the DNC. The Observer reported “Court Concedes DNC Had the Right to Rig Primaries Against Sanders.”

Note: The DNC and RNC are private. If you want to control the DNC and RNC, you only need to control a few people. Debbie Wasserman Schultz was chair of the DNC from May 4, 2011 – July 28, 2016.

September 15, 2017. Wall Street Journal: Dana Rohrabacher tries to broker a deal where President Trump would pardon Julian Assange for telling what he knew about the “leaks” from the DNC. Upon his return from London, Rohrabacher was blocked from speaking to the President by White House Chief of Staff John Kelly, Rohrabacher told The Intercept.

December 28, 2017. Investment Watch Blog publishes a tweet from Jared Beck, the lawyer suing the DNC: “Seth Rich and Shawn Lucas were witnesses in MY case. But I didn’t drop the lawsuit because of that. I accepted the possibility of dying and carried on. Some might call that “courage.” And I’m 41, not 75 like Bernie, and I have two daughters, ages 4 and 6. So FUCK RIGHT OFF. t.co/X3my8EWZCy. — Jared Beck (@JaredBeck) December 28, 2017. (For clarity, this Twitter account is now suspended, and I can’t verify that the account was Beck’s to begin with.)

Note: The attorneys who filed the lawsuit against the DNC fear for their lives. The Investment Watch Blog listed 57 deaths it felt were related to the Clintons.

March 26, 2018. In the United States District Court for the District of Columbia, Aaron Rich files lawsuit against Ed Butowsky, Matthew Couch, America First Media and the Washington Times. In perhaps the most important unreported fact in the history of media, no one reported that Aaron was “a witness before a grand jury convened to investigate Seth’s murder.” There was no date given to

Note: It would be helpful to note the date that this grand jury investigation of the murder of Seth Rich occurred. Seth was murdered July 10, and Peter Strzok “squashed” a conversation with Seth as a subject on August 10. Buzzfeed received documents from a Freedom of Information Request that the death of Lesin was investigated by a Grand Jury in 2016. I wrote something on Lesin here.

April 20, 2018. In the United States District Court for the Southern District of New York, The DNC sues the GRU, Russian Federation, “GRU Operative Using Pseudonym Guccifer 2.0,” Aras Agalarov, Joseph Mifsud, Wikileaks, Julian Assange, Donald Trump For President, Donald Trump, Jr., Paul Manafort, Roger Stone, Jared Kushner, George Papadoupolos, Richard Gates, and 10 “John Does” who were “other Russian intelligence officers or agencies.” The DNC lawsuit refers to Guccifer 2.0 as “the GRU operative using the pseudonym ‘Guccifer 2.0.’”

July 3, 2018. Imran Awan gets a plea deal for insurance fraud. This document can no longer be found on the DOJ website. There was much speculation at the time, based mainly on the reporting of Luke Rosiac of the Daily Caller, that Imran was involved in gathering information from the DCCC. The DOJ plea deal said that Imran did nothing illegal in that regard.

July 9, 2018. Daily Caller. An Inspector General Report on Imran Awan is released.

July 13, 2018. In the United States District Court for the District of Columbia, The Department of Justice indicts “Russian hackers” for hacking the DNC and DCCC. The DOJ language is vague when it comes to Guccifer. The GRU officers are lumped in with other unnamed people to become “the Conspirators.” “The Conspirators,” then, used the Guccifer 2.0 persona.

“GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”).

“Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including “DCLeaks” and “Guccifer 2.0.”

Let’s pause to break down the language. “GRU officers (who were indicted) conspired with each other, and with persons known and unknown to the Grand Jury.” First of all, if other “persons known … to the Grand Jury” committed the same crimes that the indicted GRU officers did, why weren’t these other known people indicted by the Grand Jury? Did the government even seek an indictment of these “known persons?” Were they given immunity for any reason? Further, why are there persons “unknown” to the Grand Jury at all who committed the same crimes as the GRU officers? It seems that many non-Russian facts and individuals were off-limits in this indictment process.

Second, the Indictment states that “the Conspirators” “released tens of thousands of the stolen emails and documents.” Who “the Conspirators” are can be two different groups, depending on how you read the vague language. They could be (A.), a combination of GRU officers and “persons known and unknown to the Grand Jury,” or (B.), simply “persons known and unknown to the Grand Jury.”

Certainly there is plenty of room in the language of the DOJ indictment for staffers in the DNC to be part of “the Conspirators.” This language has not been accurately reported by the press. For instance, The Daily Beast wrote on October 25, 2018, that “Mueller’s office declined to comment for this story. But the attribution of Guccifer 2.0 as an officer of Russia’s largest foreign intelligence agency would cross the Kremlin threshold—and move the investigation closer to Trump himself.” Show me where it says that in the indictment.

December 13, 2018. Bre Payton, on The Federalist, publishes an article “DOJ Destroyed Missing Strzok/Page Text Messages Before The IG Could Review Them.” This is a short, simple summary of the OIG Report of Investigation: Recovery of Text Messages From Certain FBI Mobile Devices.

December 27, 2018. Bre Payton, age 26, dies after a sudden fast moving illness.

Speculation: It’s likely that the text communications between Strzok and Page which the DOJ wiped contained discussion of Seth Rich. Payton would have then been killed as a warning not to discuss this subject, an if you notice, not to many people do, certainly not in the mainstream media.

SUMMARY

In the process writing this article, I’ve stumbled on the reality that it doesn’t have to be just (A) “Russia did it,” or (B) “DNC staffers did it,” obviously it can be (C) “they both did it.”

If you assume that both DNC staffers and the GRU were involved in hacking the DNC at some level, it removes the hurdle of assuming that the Department of Justice was lying in its Indictment of the GRU. The DOJ indicted specific members of the GRU, but when they reported the details of the hack of the DNC, they always used the term “The Conspirators.” “GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”).

(A), “Russia did it.” I can’t say if Russia was involved or not for certain. The CIA has the capability to fabricate computer logs to look like another party “hacked” something. It’s not much of a leap to believe that CrowdStrike could also have similar technology received from the CIA or any other national or private intelligence service that also had the same type of technology. CrowdStrike could easily fake/falsify computer logs and hand them over to the FBI for analysis. Other than the DOJ report, based on the FBI investigation of the DNC server logs, the only evidence pointing to Russia’s involvement is in the “Steele Dossier.” There’s far too much “reasonable doubt” here. In a court, both the prosecution and defense would have access to the DNC servers.

(B), “The DNC Staffers did it.” On the other hand, there is a great deal of evidence demonstrating the involvement of DNC staffers. There is no question that employees of Bernie Sanders accessed the voter roles of Hillary Clinton. The “hack” of John Podesta also appears to have been coordinated by IT workers who were not naive enough to say that a “phishing email” was “legitimate.” There is a wealth of information, as reported by Luke Rosiac, about the involvement of Imran Awan in accessing DCCC emails. Guccifer 2.0 said Seth Rich was his/her/their source. I could go on, but you get the point. If the only choices or “A” or “B” alone, it would have to be B. But there is option C.

(C), “Both the GRU and DNC staffers were involved in the hack of the DNC.” I put the odds of A (alone) at 0%, B (alone) at 20%, and C at 80%. This is not such a long shot. “GRU officers who knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury (collectively the “Conspirators”). I’ll spend the next section explaining why it doesn’t have to be A or B, but I won’t try to back it up a great deal with sources. I just want the audience to understand a motive why people from these two groups might work together, and a motive why people like Seth Rich, Shawn Lucas, and Bre Payton (along with countless others) would be silenced.

The best way for me to understand the players here is not The United States vs. Russia, Democrats vs. Republicans, or entities like that. Hackers describe themselves as “black hats” and “white hats,” (although most of the world is a shade of gray in my opinion). It’s good vs. bad.

The “bad” is a shadow world government. Various people describe this group as the “New World Order,” variants of the word “Mega,” and even “Illuminati.” I’ll just use the type of terminology the DOJ would use- and call it “The Organization.”

The Organization attempts to control the nations of the world by controlling the leaders of their governments. One way to control government in the United States is by controlling the organizations that determine the leaders we will vote for in the primary process- the DNC and the RNC. Their goal is to control both candidates in the general election. Certainly Hillary Clinton and Donald Trump qualified last time.

It is entirely plausible and even likely in my opinion that DNC staffers were trying to expose corruption in the Democratic primary process. How many people, even Democrats, doubt that there is evidence of a “pay to play” scheme in her “private” emails where Hillary would essentially sell public positions through donations to the Clinton Foundation. However, I don’t care to speculate whether or not the DNC staffers were aware that they were fighting something larger than DNC corruption per se. That’s their business. Whether or not they were aware of it, they were part of a larger effort to bring facts into the light. It’s clear in the sweep of history that there is such an effort. At some point, one can surmise, after they expose enough information over a period of decades, and sources liberal and conservative, mainstream and obscure, they are hoping someone will put it all together and connect enough dots to prove it to an extent that the public finally understands what’s going on, and forces the government to do something about it.

People who bring facts to light against this group, or know too much, are routinely silenced. Just a few notable for instances, Danny Casolaro (1991), Gary Devore (1997), Jill Dando (1999), David Kelly, (2003), Gary Webb, (2004).

The sad fact appears to be that the effort to control the government of the United States has been largely successful. By controlling the institutions that produce political candidates, and control of massive sums of money (now unregulated thanks to Citizens United), this network controls most of the top candidates we vote for. Prospective political candidates are chosen from a list of people they have compromised. It’s not just the underaged statutory rape, either. It’s the uglier stuff- the Satanism, incest (what else can you think about some photos of Donald and Ivanka Trump) and such they perfected in MK Ultra and Project Monarch. By controlling the White House, they in turn control the Department of Justice. By controlling the Department of Justice, the Central Intelligence Agency has effectively become a front for transnational crime operation in the United States, including child sex trafficking.

So we have both the FBI and CIA headquarters named after pedophiles (Herbert Hoover and George Bush). You don’t believe me? Read the book I referenced and say that.

Investigations into this group are silenced by a couple of methods. The first of course, is assassination. The other one we are all familiar with is the technique of what I describe as partial investigations. Investigations never reach the top level of our politicians because they are blocked by the ability of the Executive Branch to claim “National Security” and
“Executive Privilege” on any fact that leads to them. Don’t worry about what the legal standards for these claims are- they don’t matter. You’ll never get to see the fact and apply it to the standard, so effectively there is no oversight for the standard. Now even Congress is locked out, after President Trump refused to provide one document to the Congress investigating him. You can say that the Ukraine Impeachment was weak all you want (and it was), but the most important fact in all that is now the Executive Branch is finally completely above the law. By ignoring the “Abuse of Power” charge, the GOP chose to bring a Monarchy to the United States. Congress used to have the “power of the purse” as well, but after Trump shifted funding from military spending to “The Wall” after Congress defunded it, that’s gone too.

The DNC staffers, to one extent or another, consciously or not, were fighting against the same group with friendly Russians, in my opinion. I believe the warning from the SVR to the US Government about Seth Rich was true, based on the circumstances, and the language used in the DOJ indictment of the GRU which included people “known and unknown to the Grand Jury.” I believe the network feared the exposure of how they controlled the DNC, and their well-groomed and controlled candidate Hillary Clinton, and that Seth Rich would have been a big part of that lawsuit, as described to some extent by Jared Beck.

All they have to do is keep compromising and funding their candidates for the White House. They are more untouchable now than they have ever been.

There is a good side to all this. The death of Seth Rich did appear to be investigated by the FBI. The coverup of this investigation could expose to the American public the how and why that things like this are covered up. Hopefully Judicial Watch’s lawsuit will give the public enough information to demand that Congress investigate properly for once.

END

Leave a Reply